O..y M..a (2-2001) | PDF | 540 pages | 0596000111 | 6Mb SSH, The Secure Shell: The Definitive Guide /by Daniel J. Barrett, Richard Silverman. Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based soluti
...
Read more »
|
O..y M..a (9-2007) | PDF | 860 pages | 0596009631 | 12Mb Security Power Tools /by Bryan Burns. What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts revea
...
Read more »
|
S..s (9-2010) | PDF | 376 pages | 1597495883 | 10Mb Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques /by Thomas Wilhelm, Jason Andress. Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no do
...
Read more »
|
M..w H..l 3/ed (7-2008) | PDF | 614 pages | 0072262575 | 10Mb Hacking Exposed Linux, 3rd Edition /by ISECOM. This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux
...
Read more »
|
S..er 2/ed (9-2011) | PDF | 1475 pages | 144195905X | 27.7Mb Encyclopedia of Cryptography and Security /by Henk C.A. van Tilborg and Sushil Jajodia. Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and informat
...
Read more »
|
Ar..h H..e (9-2004) | PDF | 266 pages | 1580535313 | 1.9Mb Outsourcing Information Security /by C. Warren Axelrod. This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you compl
...
Read more »
|
S..ybex (6-2011) | EPUB | 336 Pages | 111801684X | 14.0Mb Microsoft Windows Security Essentials /by Darril Gibson. Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and
...
Read more »
|
Kn0pf (10-2011) | EPUB+MOBI | 304 pages | 0307592936 | 2.7Mb DarkMarket: Cyberthieves, Cybercops and You /by Misha Glenny. From one of the most intrepid investigative reporters at work today--an authoritative, edge-of-your-seat account of the new form of crime spawned by the digital world. We bank online; shop online; date, learn, work, live online. But have the institutions that ke
...
Read more »
|
Springer (9-2010) | PDF | 159 pages | 159 pages | 3.3Mb Spyware and Adware /by John Daniel Aycock. Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at
...
Read more »
|
Wrox (3-2007) | PDF | 360 pages | 0470101547 | 7.8Mb Professional Rootkits /by Ric Vieler. Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through
...
Read more »
|
Delacorte (9-2003) | PDF | 272 pages | 0385730624 | 1.8Mb The Code Book: How to Make It, Break It, Hack It, Crack It /by Simon Singh. Calling upon accounts of political intrigue and tales of life and death, author Simon Singh tells history's most fascinating story of deception and cunning: the science of cryptography--the encoding and decoding of private information. Based on The Code
...
Read more »
|
Academic Press (3-2009) | PDF | 240 pages | 0123748909 | 2.6Mb Cryptographic Boolean Functions and Applications /by Thomas W. Cusick and Pantelimon Stanica. Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of d
...
Read more »
|
Syngress (5-2011) | PDF | 360 pages | 1597496154 | 3.3Mb Security Risk Management: Building an Information Security Risk Management Program from the Ground Up /by Evan Wheeler. The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale be
...
Read more »
|
No Starch (4-2009) | PDF | 232 pages | 1593271921 | 3.0Mb Gray Hat Python: Python Programming for Hackers and Reverse Engineers /by Justin Seitz. Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers
...
Read more »
|
Cisco Press (12-2008) | PDF | 576 pages | 1587055945 | 5.2Mb IPv6 Security /by Scott Hogg and Eric Vyncke. As the world’s networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world’s leading Internet security pract
...
Read more »
|
|